PBDMS HW3 (1)
.docx
keyboard_arrow_up
School
University of Missouri, Kansas City *
*We aren’t endorsed by this school
Course
5560
Subject
Computer Science
Date
Dec 6, 2023
Type
docx
Pages
5
Uploaded by DukeFreedom11576
Name: Vignesh Mannava
Section: 3
1.
[
20 points
] Suppose you logged in your social network website and updated your profile
picture and called one of your friends to check. Your friend joins the website and still
sees your old picture you had. Draw an event diagram like the one shown in class to
show how this can happen in a replicated data system.
Event Diagram: Profile Picture Updates
Client
Server 1
Server 2
Two servers keep the user credentials (replicated data).
Password is updated in one server, but the login is attempted in the other server before the
password is updated in the second one.
Friend
Me
Update Picture
Failed to see the
Updated Picture
Updated
Picture
Sign In
Picture Updated
Not Updated
Picture
2.
(a) [
15 points
] What does the following three consistency models mean?
a.
Consistent prefix
Consistent prefix:
This structure ensures that out-of-order writes are never seen by readers.
This implies that every read of a data item will always see the first write before the second write
if an edit to the data item happens before another write. The data might not always be up to
date, though. For instance, even if the initial write is the most recent one, a read of the data item
can return the subsequent write if there is a write to it and additional writing happens before the
first write has been reproduced to every duplicate.
b.
Bounded staleness
Bounded staleness:
This paradigm ensures that clients will never see material that is older
than a certain period of time. The staleness bound refers to the maximum period of time during
which information can be outdated. A read of a data item will never return data that is older than
five seconds, for instance, if the staleness restriction is set at five seconds. The information
might not always be up to date, though. For instance, even if the first write is the most recent, a
read of the data item may return the subsequent write if a write to it happens and then another
writing to the same data item happens before the first write has been replicated to all replicas.
c.
Monotone read
Monotone read:
The technique ensures that reading a data item will always yield an escalating
sequence of data or the same value. This implies that a read of the data item will never return
the second write if the first write has already been accessed if a write to the data item happens
and then another write to the same piece of data happens before the first write has been
propagated to all replicas.
Strong consistency ensures that readers consistently view the most current writing, and it is the
stronger of all these fidelity models. Those are, nonetheless, also far more effective, and
scalable than solid consistency.
(b) [
15 points
] Suppose your changed your profile picture to these fruits in this order:
d.
On Monday, “Apple”
e.
On Tuesday, “Orange”
f.
On Friday, “Mango”
g.
On Sunday, “Pineapple”
Your friend saw your updates in the following listed orders: Which consistency models do
these updates satisfy? (it can be zero or more models)? Explain your answer in short.
(i)
“Apple”, “Orange”
This order matches the update order and satisfies the constrained staleness and monotone
read consistency Prefixes.
(ii)
On Monday “Apple”, on Sunday “Mango”.
This order satisfies the bounded staleness and monotone read consistency models, but not the
consistent prefix consistency model, because the friend observed the "Mango" update before
the "Orange" update.
(iii)
On Monday “Pears”, On Wednesday “Watermelon”, on Sunday
“Pineapple”.
This order fulfills the bounded staleness consistency model because the buddy observed all of
the updates, but it does not satisfy the consistent prefix or monotone read consistency models
because the updates were observed in a different order than they were applied.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Design the layout of users, domains, trusted domains, anonymoususers, etc for a start-up open source software company ABC. Theyshould have an internal CVS server, which only internal developerscan access, an anonymous CVS server for outsiders to downloadsource code, WWW servers (one for internal and one for external),and a mail server. Outsiders should not be able to access eitherinternal CVS or internal WWW servers..You should finish the following parts:a) The topology diagram for the different servers and locations andtrust domains. For example, where are the firewalls, and whereare the users located in the topology.b) The assumptions that you make for your design and the securitypolicy to achieve this assumption
Your final document should include the following parts:1. Network topology diagram and the domains of trust.2. Security related assumptions in your design, and security policy tomake this assumption valid.3. Trust assumptions about users (e.g., who could be root, what…
arrow_forward
Draw an ER diagram using Cardinality Notation for the following description:
A veterinary hospital only treats dogs and cats (use ISA). Clients have an address, phone number and client ID. Each pet has a name, a pet ID and belongs to exactly one client. Each client can have at most 5 cats and 2 dogs.
arrow_forward
The code of declaration a connection string with:
database consists the parameters
Datasource,initial Catalog and Integrated .i
Security
ServerName,initial Catalog and Integrated.i.
Security
Datasource.View Name and Integrated .iii
Security
Datasource, Table Name and Integrated .iv
Security
arrow_forward
Build out a Database Installation Plan that takes the installation of MYSQL through installation and configuration to implement your security plan. Your plan should include a section that has test scenarios to validate the installation and configuration.
arrow_forward
Answer in 10 minutes and get the thumbs up please show neat and clean work
arrow_forward
CSV FILE INFO• Option: Scrape, not download, the CSV file instead of scraping table.
Create the 6 agents to handle the annual data. These agents extract the yearly dataa time over the range 1990 thru 2019. When the data has been extracted, the plota linear regression for each threaded agent.Threading rules:▪ Only one agent can access the database at a time.▪ The database inquiry only request one cell of data per request for data.▪ The agents must make repeated requests for annual data.After collecting the data, plot a liner regression for each gas using either Matplotlibor Plotly.
arrow_forward
1. Create a new account with MongoLab and create a new MongoDB Deployment and set the plan to sandbox:
2. Add a route that adds a product. It should delegate to the product manager module. Modify the product-manager to store the product in your mongolab db.
3. Add a route that deletes products. It should delegate to the product manager module. Modify the product-manager to delete the product in your mongolab db.
4. Modify the handler for your route that returns products to retrieve the products from your mongolab db.
Zip your entire project up in a folder called “assignment_5”. Submit the zip folder and your description of the modules in the assignment dropbox.
arrow_forward
1. Create a new account with MongoLab and create a new MongoDB Deployment and set the plan to sandbox:
2. Add a route that adds a product. It should delegate to the product manager module. Modify the product-manager to store the product in your mongolab db.
3. Add a route that deletes products. It should delegate to the product manager module. Modify the product-manager to delete the product in your mongolab db.
4. Modify the handler for your route that returns products to retrieve the products from your mongolab db.
Zip your entire project up in a folder
arrow_forward
Create a new database using phpmyadmin (or any other method you choose). The database should have at least two tables:
One table should be able to store the username and password of users for session management. Insert one record in this table for use later in the project.
The second table should be able to store the articles written by the user. The only information we need for articles is the author (which would be a user of the system), the title of the article and the content of the article. The content field should be able to store at least a thousand characters. Insert one simple record in this table for use later in the project
H4
arrow_forward
pls help
You have been hired by a doctors office to analyze the current state and determine requirements for a Patient booking system. In creating models that reflect the current state you draw a circle in the center of the page. You then draw things around the circle. The things around the circle are called
A closed system
Something that sits next to the database
An actor
A Thing
arrow_forward
Draw a UML class diagram consistent with the following sequence diagram.
: DBClass
:Connection
: Statement
PersistencyClient
PersistentClass
1. create( )
1.1. new( )
1.2. getData( )
1.3. createStatement()
1.4. executeUpdate(string)
arrow_forward
For the following scenario for a point of sale system, draw the
following:
• A mail order company that distributes CDs and tapes at discount
prices to record club members (tells the purpose of the system).
• When an order processing clerk receives an order form, she
verifies that the sender is a club member by checking the
MEMBER FILE. If the sender is not a member, the clerk returns
the order along with a membership application form.
• If the customer is a member, the clerk verifies the order item data
by checking the ITEM FILE.
Then the clerk enters the order data and saves it to the DAILY
ORDERS FILE.
• At the same time, the clerk also prints an invoice and shipping
list for each order, which are forwarded to the ORDER
FULFILLMENT DEPARTMENT for processing there.
Answer:
arrow_forward
Task 2: Evaluation of Transcon Controls
Identify from the SAD what security controls Transcon already has in place that could assist
with the prevention of spear-phishing attacks. Hint: refer to section '7 Interfaces'.
Provide Transcon with a recommendation of a suitable technology solution to help protect the
NOMS system from spear-phishing attacks. Ensure to provide Transcon with a reason for your
recommendation and explain how it would fit in with the NOMS High-level integration diagram
displayed in Figure 7 of the SAD.
arrow_forward
Which diagram type is shown in this figure? Describe the diagram completely.
arrow_forward
1. One of the responsibilities of the Controller in MVC is to Connect to the database engine
True
False
2.
The most commonly used format for modern Web Services is JSON.
True
False
3.
With Web API controllers a route like /home/index tells us the Controller class name and the action method name.
True
False
4.
One of the responsibilities of the Controller in MVC is to Displays data to the user
True
False
5.
Web services serve their data to a browser.
True
False
6.
When MVC is applied to a Web service only, the Controller MVC component is present.
True
False
7.
One of the responsibilities of the Controller in MVC is to Select proper Models for Views
True
False
arrow_forward
Tyler Richardson set up a house alarm system when he moved to his new home in Seattle. For security purposes, he has all of his mail, including his alarm system bill, mailed to his local UPS store. Although the alarm system is activated and the company is aware of its physical address, Richardson receives repeated offers mailed to his physical address, imploring him to protect his house with the system he currently uses. What do you think the problem might be with that company’s database(s)?
arrow_forward
Create a BPMN model (1) (Application layer) of the following Application scenario:
A housing system is run by the campus housing service which helps students find apartments. Apartment owners complete information forms (Add a rental unit/Delete Apartment) about the available/vacant rental units based on three criterions: (Distance from campus, Number of bedrooms, Monthly rent), which are then entered into a database. These criteria can be used individually or by any combination of the three. Students can Search Available Rental Units via the Web to find apartments that meet their needs (e.g., a two-bedroom apartment for $400 or less per month within 100 meters of campus) and contact the apartment owners directly to see the apartment and possibly rent it.
arrow_forward
Which diagram type is shown in this figure? Describe the diagram completely.
Medical Receptionist
PRS
옷
P: Patientinfo
D: Mentcare-DB
AS: Authorization
login ( )
ok
alt
[sendinfo]
updatelnfo( )
updatePRS (UID ) I
authorize (TF, UID)
authorization
update (PID)
update OK
Message (OK)
[sendSummary]
UpdateSummary(
summarize (UID )
authorize (TF, UID)
authorization
:summary
update (PID)
Message (OK)
update OK
logout ()
arrow_forward
and some More lab 9
For the last lab of the term, I want you to create a practical application for your database, in which you modify it in some way, for instance, taking a new order. Since the emphasis is on the database connectivity, neither a
GUI nor a web application is required.
In fact, a GUI would require x2go, which I don't have at home and you probably don't either.
A web interface would need to be on osiris, I could figure out some way to try it out, I guess. There are also numerous security concerns.
The applications should be easy for someone like a store employee or on-line customer to use. The most common operations, such as adding a customer or renting a tool, should be implemented. These Part 1 instructions
now include how to use postgresql in C as well as Java and python.
The important issue of transactions and commit status is addressed here.
Some previous notes about web applications, and the PHP language
[Previously I wrote] Now write one more program, that updates…
arrow_forward
Think of a bank that has several database locations.Assume that persistent messaging is the sole method available for the databases to interact. This database is distributed, right? Why?
arrow_forward
Start with a database transaction. We'll look on the bright side when we meet again.
arrow_forward
Web Services
arrow_forward
“Supporting a travel agency, TORS maintains tour information and provides reservation facilities for the people who wish to travel on tours via the Internet. The system allows users to view information about the tours available and make a reservation on a tour without asking the employees at the agency. Using the system, a user can cancel an existing reservation that the user made. The system also allows the user to send feedbacks by e-mail to the agency and stores the feedback in the database. Finally, the system allows the employees of the agency to manage customer information and tours such as adding, deleting, and updating information on customers and tours. For security purposes, the employees are required to provide login credentials (ID and password) to access the system.”
Implement the design sequence diagrams and their corresponding portion of the class diagram which is already developed . User interface may be textual or graphical. If data storage is needed, use a simple text…
arrow_forward
“Supporting a travel agency, TORS maintains tour information and provides reservation facilities for the people who wish to travel on tours via the Internet. The system allows users to view information about the tours available and make a reservation on a tour without asking the employees at the agency. Using the system, a user can cancel an existing reservation that the user made. The system also allows the user to send feedbacks by e-mail to the agency and stores the feedback in the database. Finally, the system allows the employees of the agency to manage customer information and tours such as adding, deleting, and updating information on customers and tours. For security purposes, the employees are required to provide login credentials (ID and password) to access the system.”
1. Considering System Sequence Diagram(SSD) given in the question develop design sequence diagrams (DSD) for each system operation in the SSD.
arrow_forward
The local DMV processes applications for driver’s license renewals with the following three steps. First, the customer registers with the receptionist, who updates the customer’s information in the database. This first step takes 2 minutes per customer. Then, the customer visits one of two cashiers to pay the associated fees for the license renewal. This takes 8 minutes per customer. Finally, the customer visits one of three license processing stations where the customer’s picture is taken and the license is printed. This final step takes 15 minutes per customer. Assume demand is 20 customers per hour.
When the DMV opens in the morning, about how long will it take to process the first 50 customers? (Show your work)
A. 3.6 hours
B. 3 hours
C. 2.8 hours
D. 1.9 hours
arrow_forward
Create a database of at least 10 clients . Design an interface(html,javascript and css) with which to send the email notification to the appropriate group of clients. In the email, state the start date of the promotionand also offer a gift to the first 10 people who sign up for the promo.
arrow_forward
Quiz 2/III
Draw the use case model and write main scenario and extensions for the following:
student online registration in a computer college :
a student enters his information in the college website and receives a registration code
to his email . then login the email to complete the process and get a message that he is
being added to the student database if his degrees are under the average the system will
redirect the record to another college.
arrow_forward
Suppose two client sessions are connected to a single database table, if session one issues a read lock on the table:
What would happen if session one issues a write command to the locked table?
What would happen if session two issues a write command to the locked table?
arrow_forward
133.
In database schema, the database snapshot is also called
a.
current set of entity
b.
current set of instances
c.
current set of entity
d.
current set of objects
arrow_forward
database and database application ??!
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education
Related Questions
- Design the layout of users, domains, trusted domains, anonymoususers, etc for a start-up open source software company ABC. Theyshould have an internal CVS server, which only internal developerscan access, an anonymous CVS server for outsiders to downloadsource code, WWW servers (one for internal and one for external),and a mail server. Outsiders should not be able to access eitherinternal CVS or internal WWW servers..You should finish the following parts:a) The topology diagram for the different servers and locations andtrust domains. For example, where are the firewalls, and whereare the users located in the topology.b) The assumptions that you make for your design and the securitypolicy to achieve this assumption Your final document should include the following parts:1. Network topology diagram and the domains of trust.2. Security related assumptions in your design, and security policy tomake this assumption valid.3. Trust assumptions about users (e.g., who could be root, what…arrow_forwardDraw an ER diagram using Cardinality Notation for the following description: A veterinary hospital only treats dogs and cats (use ISA). Clients have an address, phone number and client ID. Each pet has a name, a pet ID and belongs to exactly one client. Each client can have at most 5 cats and 2 dogs.arrow_forwardThe code of declaration a connection string with: database consists the parameters Datasource,initial Catalog and Integrated .i Security ServerName,initial Catalog and Integrated.i. Security Datasource.View Name and Integrated .iii Security Datasource, Table Name and Integrated .iv Securityarrow_forward
- Build out a Database Installation Plan that takes the installation of MYSQL through installation and configuration to implement your security plan. Your plan should include a section that has test scenarios to validate the installation and configuration.arrow_forwardAnswer in 10 minutes and get the thumbs up please show neat and clean workarrow_forwardCSV FILE INFO• Option: Scrape, not download, the CSV file instead of scraping table. Create the 6 agents to handle the annual data. These agents extract the yearly dataa time over the range 1990 thru 2019. When the data has been extracted, the plota linear regression for each threaded agent.Threading rules:▪ Only one agent can access the database at a time.▪ The database inquiry only request one cell of data per request for data.▪ The agents must make repeated requests for annual data.After collecting the data, plot a liner regression for each gas using either Matplotlibor Plotly.arrow_forward
- 1. Create a new account with MongoLab and create a new MongoDB Deployment and set the plan to sandbox: 2. Add a route that adds a product. It should delegate to the product manager module. Modify the product-manager to store the product in your mongolab db. 3. Add a route that deletes products. It should delegate to the product manager module. Modify the product-manager to delete the product in your mongolab db. 4. Modify the handler for your route that returns products to retrieve the products from your mongolab db. Zip your entire project up in a folder called “assignment_5”. Submit the zip folder and your description of the modules in the assignment dropbox.arrow_forward1. Create a new account with MongoLab and create a new MongoDB Deployment and set the plan to sandbox: 2. Add a route that adds a product. It should delegate to the product manager module. Modify the product-manager to store the product in your mongolab db. 3. Add a route that deletes products. It should delegate to the product manager module. Modify the product-manager to delete the product in your mongolab db. 4. Modify the handler for your route that returns products to retrieve the products from your mongolab db. Zip your entire project up in a folderarrow_forwardCreate a new database using phpmyadmin (or any other method you choose). The database should have at least two tables: One table should be able to store the username and password of users for session management. Insert one record in this table for use later in the project. The second table should be able to store the articles written by the user. The only information we need for articles is the author (which would be a user of the system), the title of the article and the content of the article. The content field should be able to store at least a thousand characters. Insert one simple record in this table for use later in the project H4arrow_forward
- pls help You have been hired by a doctors office to analyze the current state and determine requirements for a Patient booking system. In creating models that reflect the current state you draw a circle in the center of the page. You then draw things around the circle. The things around the circle are called A closed system Something that sits next to the database An actor A Thingarrow_forwardDraw a UML class diagram consistent with the following sequence diagram. : DBClass :Connection : Statement PersistencyClient PersistentClass 1. create( ) 1.1. new( ) 1.2. getData( ) 1.3. createStatement() 1.4. executeUpdate(string)arrow_forwardFor the following scenario for a point of sale system, draw the following: • A mail order company that distributes CDs and tapes at discount prices to record club members (tells the purpose of the system). • When an order processing clerk receives an order form, she verifies that the sender is a club member by checking the MEMBER FILE. If the sender is not a member, the clerk returns the order along with a membership application form. • If the customer is a member, the clerk verifies the order item data by checking the ITEM FILE. Then the clerk enters the order data and saves it to the DAILY ORDERS FILE. • At the same time, the clerk also prints an invoice and shipping list for each order, which are forwarded to the ORDER FULFILLMENT DEPARTMENT for processing there. Answer:arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education